How To Manage A Mobile Device Management At Harvard
|
|
|
- Cornelius Gilmore
- 5 years ago
- Views:
Transcription
1 Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS
2 Objec&ves Our hope is that this conversa0on will get people thinking about mobile device management: Why is this important? And why is it 0me sensi0ve? How do we get there from here? What do we need to be doing? Why would you want to use MDM socware at SEAS? Why we need end- to- end mobile security management Solu0ons to monitor, control and protect across devices, apps, data and the network. Enrollment Demo and Q&A 2
3 Why do we need to think about this? Why can t we delay? TRENDS, RISKS & CHALLENGES
4 Trends: Personal Mobile Device Use 4
5 Risks and Challenges: An Evolving Landscape
6 Trends: Mobile Devices in the Workplace 6
7 Risks & Challenges: How do we protect Data & Iden88es? Harvard is a high- value target for many such threats 7
8 Risks & Challenges: How do we protect Data & Iden88es? Are Paid Apps Safer Than Free Apps? ios vs. Android Apps? 8
9 Risks and Challenges: What are other schools doing? Some schools are using a MDM vendor, others are leveraging resources they already own. AirWatch clients include Georgetown, Indiana University & UCLA Stanford has developed their own solu0on. Yale also offers an MDM solu0on to their customers. Harvard is BEHIND the curve
10 What do we need to be doing? Why should you use MDM socware? GETTING THERE FROM HERE
11 WHY use MDM? If you don t have a mobile strategy, you don t have a future strategy. Eric Schmidt (Google)
12 WHY use MDM? Allow you to use your mobile device for work purposes while making sure your data is protected. We all lose if your security is compromised. What do mobile devices bring to the table? How does the use of mobile devices ENABLE the pedagogy at Harvard? These are no longer just status symbols...they are useful devices. These are the func0ons that you want to embrace, enable, and foster How could the use of mobile devices INHIBIT the pedagogy or even HARM the school?
13 Security is the main reason companies hesitate to embrace mobile
14 Resistance I don t want to lock my phone what if I forget the code? It s my device, not Harvard s! Just treat them the same way we do laptops. Harvard Approved Vendors don t provide these services in the way we want MDM products are EXPENSIVE! We re a school, not a bank! The faculty will never go for it Lock codes are annoying! If I lock my ipad down, my kids can t use it! It s a viola&on of my privacy! I don t want Harvard to be able to track my loca8on!
15 How do they complicate things? CLOUD SERVICES
16 Mobile Device & Cloud - Security Issues Mobile Devices Bring Cloud Storage & Security Risks Mobile devices with their limited storage and compu.ng capabili.es are drivers for having services provided by Cloud Compu.ng (icloud, Dropbox, AWS ). Insecure cloud- based backup and highly confiden0al informa0on from mobile devices. icloud Use of Pages, Numbers on ipad automa0cally copies file to Apple s servers. Non- compliance with data protec0on regula0ons. Privacy and iden0fy thec case of Mat Honan, Senior writer at wired.com - whole his digital life was erased.
17 What DON T MDM products do? MDM products leverage the capabili0es of the na0ve device If the device doesn t handle encryp.on If the device doesn t allow pajern swipe- unlock or enable 6- digit numeric pins If the OS s error message is confusing
18 What does MDM NEED to do? Today s devices need a solu0on to monitor, control and protect the enterprise across devices, apps, data and the network.
19 What would we NEED a MDM to do? Can we do these things WITHOUT inhibi8ng the customer s use of the Device device? Usability Device protec&on and compliance Can we help our customers follow Harvard s policies for how sensi8ve informa8on is handled? Access to HU Services Same goals Are we ensuring that customers have access to the RIGHT set of services?
20 What would we NEED a MDM to do? Enable us to help our customers follow Harvard s and SEAS policies and standards Phased approach to implementa0on: PIN/ Password, encryp0on, locate, lock, and wipe
21 First Phase: Password policy, encryp&on, and locate/lock/wipe features Ensure your device is encrypted
22 AirWatch SAMPLE MDM PRODUCT
23 AirWatch End- to- End Security Solu&on Airwatch provides solu0ons to meet almost all of the above requirements. SEAS started AirWatch pilot project in February 2013 op0ons and ini0al results in end- to- end mobile security management.
24 AirWatch Installa&on/Enrollment Guides Installa0on and enrollment guides for ios and Android are available at SEAS ISO website: hgp:// security/mobile- device- management
25 DEMO AND Q & A SESSION
Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.
Mobility options and landscapes are evolving quickly for the corporate enterprise. Mobile platform providers such as Apple, Google and Microsoft, and leading device hardware vendors are constantly updating
UAB Cyber Security Ini1a1ve
UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment
Mobile Security & BYOD Policy
Mobile Security & BYOD Policy Sarkis Daglian Assistant Manager, Desktop Support Office of Information Technology Isaac Straley UCI Information Security Officer Office of Information Technology Speakers
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
AirWatch for Android Devices
Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by UMHS to ensure security for smart phones and tablets that connect to the UMHS environment. AirWatch provides
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT
Feature Matrix MOZO CLOUDBASED MOBILE DEVICE MANAGEMENT Feature Mobile Mobile OS Platform Phone 8 Symbian Android ios General MDM settings: Send SMS *(1 MOZO client settings (Configure synchronization
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
Connec(ng to the NC Educa(on Cloud
NC Educa)on Cloud Connec(ng to the NC Educa(on Cloud May 2012 Update! http://cloud.fi.ncsu.edu! Dave Furiness, MCNC! Phil Emer, Friday Institute! 1 First Things First Year one was about planning we are
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov
Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in
Apple Configurator MDM Site - Review
Management Options ios New Market ipads - January 2010 Several changes in a short period of time. Apple Lion Server came out June 2011. Apple Configurator came out in June 2012. Why Absolute or Alteris?
Tom Schauer TrustCC [email protected] 253.468.9750 - cell
Tom Schauer TrustCC [email protected] 253.468.9750 - cell Mobile Mobile Mobile Devices in the CU Environ Mobile Banking Risks and Reward Tom Schauer ü Since 1986 ü TrustCC Founded TrustCC in 2001 ü
Mobile Devices Using Without Losing
Mobile Devices Using Without Losing Mark K. Mellis Associate Information Security Officer Stanford University Information Security Office Tech Briefing 30March 2012 We all have mobile devices iphones,
GETS AIRWATCH MDM HANDBOOK
GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS
Top. Reasons Federal Government Agencies Select kiteworks by Accellion
Top 10 Reasons Federal Government Agencies Select kiteworks by Accellion Accellion Government Customers Include: Top 10 Reasons Federal Government Agencies Select kiteworks Accellion provides government
Data Center Evolu.on and the Cloud. Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM
Data Center Evolu.on and the Cloud Paul A. Strassmann George Mason University November 5, 2008, 7:20 to 10:00 PM 1 Hardware Evolu.on 2 Where is hardware going? x86 con(nues to move upstream Massive compute
Encrypted Email Opening and Replying to a Secure Message
First Time User Registration Opening a Secure Encrypted Email Where to go for Help Frequently Asked Questions Information Technology Encrypted Email Opening and Replying to a Secure Message First Time
Cloud Compu)ng in Educa)on and Research
Cloud Compu)ng in Educa)on and Research Dr. Wajdi Loua) Sfax University, Tunisia ESPRIT - December 2014 04/12/14 1 Outline Challenges in Educa)on and Research SaaS, PaaS and IaaS for Educa)on and Research
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
A guide to enterprise mobile device management.
WHITEPAPER A guide to enterprise Beyond expectation. www.azzurricommunications.co.uk Introduction. As smartphones and tablets proliferate in the enterprise, IT leaders are under pressure to implement an
Smart Ideas for Smartphone Security
Page 1 of 6 8814 Fargo Road, Suite 105 Richmond, Virginia 804.360.4490 www.seltekinc.com July 2013 Computer Forensics IT Support Security ediscovery Security Apps for your Smartphone Smart Ideas for Smartphone
Cloud Compu)ng: Overview & challenges. Aminata A. Garba
Cloud Compu)ng: Overview & challenges Aminata A. Garba Outline I. Introduc*on II. Virtualiza*on III. Resources Op*miza*on VI. Challenges 2 A Historical Note 1960, the idea of organizing computa)on as a
Overview of SOTI. www.so%.net
Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves
VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov
VoIP Security How to prevent eavesdropping on VoIP conversa8ons Dmitry Dessiatnikov DISCLAIMER All informa8on in this presenta8on is provided for informa8on purposes only and in no event shall Security
BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u
Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th
Mobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik
Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
MDM: Enabling Productivity in the world of mobility. Sudhakar S Peddibhotla Director of Engineering, Good Technology
MDM: Enabling Productivity in the world of mobility Sudhakar S Peddibhotla Director of Engineering, Good Technology Disclaimer None of the content in this presentation can be consider Good Technology s
Android EMM Enrollment
Android EMM Enrollment Before starting the device enrollment procedure, make sure your device is disconnected from the WUSM-Secure wireless network. Use either the Guest wireless network, or your mobile
Mobile App Containers: Product Or Feature?
ANALYST BRIEF Mobile App Containers: Product Or Feature? APPLE AND SAMSUNG HAVE TAKEN BIG STEPS WITH CONTAINERIZATION Author Andrew Braunberg Overview Secure workspaces, or containers, used for isolating
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
Mobile Device Security Is there an app for that?
Mobile Device Security Is there an app for that? Session Objectives. The security risks associated with mobile devices. Current UC policies and guidelines designed to mitigate these risks. An approach
The Seven Habits of State-of-the-Art Mobile App Security
#mstrworld The Seven Habits of State-of-the-Art Mobile App Security Mobile Security 8 July 2014 Anand Dwivedi, Product Manager, MicroStrategy strworld Agenda - Seven Habits of State of the Art Mobile App
District 211 Technology. ipad Setup Instructions
District 211 Technology ipad Setup Instructions Turn power on & Start Setup Hold down the power button to turn on your ipad. The power button is located on the top right edge of the ipad. Slide the slider
Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
Deploying iphone and ipad Apple Configurator
Deploying iphone and ipad Apple Configurator ios devices can be configured for enterprise deployment using a wide variety of tools and methods. End users can set up devices manually with a few simple instructions
How To Secure Shareware Kiteworks By Accellion
Top 10 Reasons Universities Select kiteworks by Accellion Top 10 Reasons Universities Select kiteworks kiteworks by Accellion provides higher education institutions with secure wherever, whenever access
MDM User Guide June 2012
June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App
Online Enrollment Op>ons - Sales Training. 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1
Online Enrollment Op>ons - Sales Training 2011. Benefi+ocus.com, Inc. All rights reserved. Confiden>al and Proprietary 1 Agenda Understand Why This is Important Enrollment Op>ons Available EDI Blues Enroll
Selling Hosted MS Exchange 2010 & SharePoint
Selling Hosted MS Exchange 2010 & SharePoint Presenters: David Kidd, Senior Manager, Product Management Verio Tim Shields, President and Owner Shields Technologies Moderator: Janine Soika, Channel Market
Mobile Device Management ios Policies
Mobile Device Management ios Policies Introduction ios policies allow administrators to use mobile device management features of CentraStage and push them, over the air (OTA), to ios devices (in other
BYOD: End-to-End Security
BYOD: End-to-End Security Alen Lo MBA(CUHK), BSc(HKU), CISA, CCP, CISSP, CISM, CEH IRCA Certified ISMS Lead Auditor, itsmf ISO 20000 Auditor Principal Consultant i-totalsecurity Consulting Limited [email protected]
Research Information Security Guideline
Research Information Security Guideline Introduction This document provides general information security guidelines when working with research data. The items in this guideline are divided into two different
Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents
Deploying Management and Security Agents to Mobile Devices John Engels Principal Product Manager Symantec Scott Jareo Field Enablement Engineering Symantec Agenda 1 Symantec MDM Agent Options 2 Mobile
Harry Fike [email protected]. Frostburg State University Office of Information Technology Technical Services
Harry Fike [email protected] Frostburg State University Office of Information Technology Technical Services New Technologies Challenges Solutions What we do at FSU Apple has been gaining market share
Top. Enterprise Reasons to Select kiteworks by Accellion
Top 10 Enterprise Reasons to Select kiteworks by Accellion Top 10 Enterprise Reasons to Select kiteworks Accellion enables enterprise organizations to enhance business productivity, while ensuring data
An Introduc+on to CloudPrime
TM An Introduc+on to CloudPrime Secure messaging pla/orm to protect pa2ent privacy and uphold HIPAA/HITECH regula2on Mari Tangredi, CloudPrime 1 CloudPrime Company Overview! Headquartered in San Francisco,
11 Best Practices for Mobile Device Management (MDM)
MaaS360.com > White Paper 11 Best Practices for Mobile Device Management (MDM) 11 Best Practices for Mobile Device Management (MDM) www.maas360.com Copyright 2014 Fiberlink Communications Corporation.
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager 1 AGENDA Mobile Explosion Mobile Trends BYOD Benefits, Challenges and Threats BYOD Security BYOD Strategy
GCM for Android Setup Guide
GCM for Android Setup Guide This guide provides information on...... Prerequisites for using Google Cloud Messaging service... Instructions for setting up GCM service via the Google API console... Configuring
Bring Your Own Device Policy
Bring Your Own Device Policy Purpose of this Document This document describes acceptable use pertaining to using your own device whilst accessing University systems and services. This document will be
Building a Mobile Information Management Strategy
The SIMS Partnership Transforming Transforming health health care care delivery delivery Building a Mobile Information Management Strategy The Approach Taken by UHN to Balance Both Security and Practice
2015-16 ITS Strategic Plan Enabling an Unbounded University
2015-16 ITS Strategic Plan Enabling an Unbounded University Update: July 31, 2015 IniAaAve: Agility Through Technology Vision Mission Enable Unbounded Learning Support student success through the innovaave
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
Symantec Mobile Management 7.1
Scalable, secure, and integrated device management for healthcare Data Sheet: Industry Perspectives Healthcare Overview The rapid proliferation of mobile devices in the workplace is outpacing that of any
How To Protect The Agency From Hackers On A Cell Phone Or Tablet Device
PRODUCT DESCRIPTION Product Number: 0.0.0 MOBILE DEVICE MANAGEMENT (MDM) Effective Date: Month 00, 0000 Revision Date: Month 00, 0000 Version: 0.0.0 Product Owner: Product Owner s Name Product Manager:
BadUSB On accessories that turn evil
BadUSB On accessories that turn evil Karsten Nohl Sascha Krißler Jakob Lell SRLabs Template v12 Demo 1 USB s&ck takes over Windows machine 2 Agenda
Manual for Android 1.5
Manual for Android 1.5 1 Table of Content 1. Scope of Service... 3 1.1 About Boxcryptor Classic... 3 1.2 About this manual... 3 2. Installation... 4 3. Basic functionality... 5 3.1. Setting up Boxcryptor
Healthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Securely Yours LLC We secure your information world. www. SecurelyYoursllc.com
We secure your information world www. Mobile Security Features What are the new security features in Android KitKat 4.4 and IOS 7?. IOS Feature 1 Single Sign-on Previously available for multiple apps developed
WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them
Mobile Security Top Five Security Threats for the Mobile Enterprise and How to Address Them Today s countless mobile devices present tangible opportunities to drive measurable and substantial value for
Salmon Group, Inc. An 8(a) Certified, Veteran owned company
www.salmongroupinc.com [email protected] Main Office: 888.751.5551 Fax: 240.607.6712 About Us We are a: Maryland-based, Veteran Owned Corporation Certified participant of the SBA 8(a) and Small Disadvantaged
Enterprise Mobility Services
Learn. Connect. Explore. Enterprise Mobility Services MS Anand Technical Architect Evangelist Anirudh Singh Rautela Enterprise Mobility Business lead - India The challenges we face today in keeping users
Symantec Mobile Management for Configuration Manager 7.2
Symantec Mobile Management for Configuration Manager 7.2 Scalable, Secure, and Integrated Device Management Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile devices
